“…In [10] and [11], the SOP expressions were derived under Nakagami-m and Rayleigh fading channels, respectively. Moreover, the intercept probability (IP) was derived in [12] over Rayleigh fading conditions. Likewise, the secrecy performance of cooperative EH-CRNs has been investigated in [14]- [17].…”
Physical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a cost of increased computational complexity that needs to be maintained within sustainable levels. In the present contribution, we investigate the physical-layer security of a dual-hop energy RF-Powered cognitive radio network over realistic multipath fading conditions. Assuming a spectrum sharing scenario, our analysis assumes that a source S communicates with a destination D with the aid of a multi-antenna relay R and in the presence of an eavesdropper E who is attempting to overhear the communication of both S-R and R-D links. The involved relay is powered by the renewable energy harvested from the signal sent by the source based on the power-splitting energy harvesting strategy. Furthermore, the relay uses a maximum ratio combining technique to process effectively the received signals. In addition, owing to the underlying strategy, both S and R adjust their respective transmit powers in order to avoid causing interference to the primary network. By considering both the independent identically distributed and the independent but not necessarily identically distributed flat Rayleigh fading channels, closed-form expressions for the secrecy outage probability are derived, based on which an asymptotic analysis is carried out. Our results quantify the impact of the main key system parameters and point out the optimal values ensuring a high-security performance of such a communication system. The validity of the derived results is verified extensively through comparisons with respective Monte Carlo simulation results and useful theoretical and technical insights are developed which are expected to be useful in the design of future cooperative CRNs.INDEX TERMS Cognitive radio network, energy harvesting, maximum ratio combining, physical layer security, power splitting, interference, secrecy outage probability.
“…In [10] and [11], the SOP expressions were derived under Nakagami-m and Rayleigh fading channels, respectively. Moreover, the intercept probability (IP) was derived in [12] over Rayleigh fading conditions. Likewise, the secrecy performance of cooperative EH-CRNs has been investigated in [14]- [17].…”
Physical layer security is an important and timely topic in the research of future wireless systems and it constitutes a part of the Internet of Things (IoT) notion. IoT oriented systems are largely characterized by a stringent quality of service and enhanced security requirements, which comes at a cost of increased computational complexity that needs to be maintained within sustainable levels. In the present contribution, we investigate the physical-layer security of a dual-hop energy RF-Powered cognitive radio network over realistic multipath fading conditions. Assuming a spectrum sharing scenario, our analysis assumes that a source S communicates with a destination D with the aid of a multi-antenna relay R and in the presence of an eavesdropper E who is attempting to overhear the communication of both S-R and R-D links. The involved relay is powered by the renewable energy harvested from the signal sent by the source based on the power-splitting energy harvesting strategy. Furthermore, the relay uses a maximum ratio combining technique to process effectively the received signals. In addition, owing to the underlying strategy, both S and R adjust their respective transmit powers in order to avoid causing interference to the primary network. By considering both the independent identically distributed and the independent but not necessarily identically distributed flat Rayleigh fading channels, closed-form expressions for the secrecy outage probability are derived, based on which an asymptotic analysis is carried out. Our results quantify the impact of the main key system parameters and point out the optimal values ensuring a high-security performance of such a communication system. The validity of the derived results is verified extensively through comparisons with respective Monte Carlo simulation results and useful theoretical and technical insights are developed which are expected to be useful in the design of future cooperative CRNs.INDEX TERMS Cognitive radio network, energy harvesting, maximum ratio combining, physical layer security, power splitting, interference, secrecy outage probability.
“…The PLS of multi-relays dual-hop CRNs was explored in [6]- [9]. Specifically, in [6] and [7], the communication was performed in the presence of only one eavesdropper attempting to overhear the communication channel, while multiple eavesdroppers were considered in [8] and [9]. Furthermore, In [6], optimal and suboptimal relay selection were analyzed while in [7] the relay that minimizes the signal-to-noise ratio (SNR) of the wiretap link was chosen.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, in [6] and [7], the communication was performed in the presence of only one eavesdropper attempting to overhear the communication channel, while multiple eavesdroppers were considered in [8] and [9]. Furthermore, In [6], optimal and suboptimal relay selection were analyzed while in [7] the relay that minimizes the signal-to-noise ratio (SNR) of the wiretap link was chosen. Besides, in [8], the most threatening eavesdropper is selected first according to the maximum SNR of the wiretap links between the source and the eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…In [9], the relay that maximizes the achievable secrecy rate is selected. Under these conditions, closed-form and asymptotic expressions for the SOP and intercept probability (IP) were derived over either Nakagami-m [6] or Rayleigh [7]- [9] fading channels. The IP and SOP analysis of cooperative underlay EH-based CRNs have been investigated in [10] and [10]- [14], respectively.…”
In this paper, the physical layer security of a dual-hop underlay uplink cognitive radio network is investigated over Nakagami-m fading channels. Specifically, multiple secondary sources (S i ) 1≤i≤N are taking turns in accessing the licensed spectrum of the primary users and communicating with a multi-antenna secondary base station (D) through the aid of a multi-antenna relay R in the presence of M eavesdroppers (E k ) 1≤k≤M that are also equipped with multiple antennas. Among the remaining nodes, one jammer is randomly selected to transmit an artificial noise to disrupt all the eavesdroppers that are attempting to intercept the communication of the legitimate links i.e., S i -R and R-D. The received signals at each node are combined using maximum-ratio combining. Secrecy analysis is provided by deriving closed-form and asymptotic expressions for the secrecy outage probability. The impact of several key parameters on the system's secrecy e.g., transmit power of the sources, number of eavesdroppers, maximum tolerated interference power, and the number of diversity branches is investigated. Importantly, by considering two scenarios, namely (i) absence and (ii) presence of a friendly jammer, new insights are obtained for the considered communication system. Especially, we tend to answer to the following question: Can better secrecy be achieved without jamming by considering a single antenna at eavesdroppers and multiple-ones at the legitimate users (i.e., relay and end-user) rather than sending permanently an artificial noise and considering that both the relay and the destination are equipped with a single antenna, while multiple antennas are used by the eavesdroppers? The obtained ). 2 results are corroborated through Monte Carlo simulation and show that the system's security can be enhanced by adjusting the aforementioned parameters.
“…In [25 -26], the effects of both proactive and reactive relay selection performance on Bit Error Rate (BER) are analyzed and studied in underlay CCN. Recently in [27][28][29][30], the security performance with relay selection methods under one or both of realistic operation conditions such as maximum transmit power constraint for unlicensed user's, or interference power constraint for licensed users are considered. The performance analysis of optimal decode-and-forward (DF) relay selection for the full-duplex (FD) mode in underlay cognitive radio (CR) networks is studied in [31], with the impact of critical parameters such as the residual self-interference, the distributions of the received signal-to-noise ratio (SNR) and the outage probability.…”
The definition of the bandwidth efficiency (BE) of cognitive cooperative network (CCN) is the ratio between a number of the licensed slot(s) or sub-channel(s) used by the unlicensed users to transmit a single data packet from the unlicensed transmitter to unlicensed destination, and from unlicensed relay(s) to unlicensed destination. This paper analyzes and improves the BE in the underlay CCN with a new reactive relay selection under interference and power constraints. In other words, this paper studies how unlicensed cooperative users use the licensed network slot(s) or sub-channel(s) efficiently. To this end, a reactive relay selection method named as Relay Automatic Repeat Request (RARQ) is proposed and utilized with a CCN under interference and power constraints. It is shown that the BE of CCN is higher than that of cooperative transmission (CT) due to the interference and power constraint. Furthermore, the BE of CCN is affected by the distance of the interference links which are between the unlicensed transmitter to the licensed destination and unlicensed relay to the licensed destination. In addition, the BE for multiple relays selection over a CCN under interference and power constraints is also analyzed and studied, and it is shown that the BE of CCN decreases as the number of relays increases.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.